Search results

1 – 10 of 131
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 7 October 2019

Io Vassiliadou, Esther Tolani, Lindsay Ip, Abigail Smith and Iliatha Papachristou Nadal

Recent models of care incorporate service user involvement within the development and sustainability of a quality improvement project. The purpose of this paper is to demonstrate…

242

Abstract

Purpose

Recent models of care incorporate service user involvement within the development and sustainability of a quality improvement project. The purpose of this paper is to demonstrate the significance of working with patients and members of the public for the integration of psychosocial care into long-term condition (LTC) management.

Design/methodology/approach

Research shows that mental health difficulties are more prevalent in people with LTC. The three Dimensions for Long-term Conditions (3DLC) is a patient-centred multidisciplinary service which integrates psychological and social care into the usual physical care. Thematic analysis was conducted on the discussions of the two patient and public involvement workshops that were facilitated by the service. The workshops included healthcare professionals, patients with LTC and their carers.

Findings

Several themes and subthemes emerged which highlighted the importance of discussing and treating mental health in a physical health setting, the challenges that both the patients and healthcare professionals encounter and the ways in which an integrated care service may address these barriers. The findings show that there was an emphasis on patient-centeredness, accessibility of services and the need for better communication.

Practical implications

People with LTC can be empowered to better self-manage their condition, whilst having access to all types of care, physical, social and psychological. By involving service users in the implementation process of the 3DLC service, the components of an effective integrated service are delineated.

Originality/value

The service users have identified barriers and facilitators of integrating a biopsychosocial model in care pathways. This has helped the 3DLC team to further develop the model to ensure improvements in condition-specific outcomes, quality of life and healthcare utilisation.

Details

Journal of Integrated Care, vol. 28 no. 2
Type: Research Article
ISSN: 1476-9018

Keywords

Access Restricted. View access options
Article
Publication date: 30 July 2019

S. Vijayakumar Bharathi

Internet of Things (IoT) interconnects many heterogeneous devices to each other, collecting and processing large volumes of data for decision making without human intervention…

807

Abstract

Purpose

Internet of Things (IoT) interconnects many heterogeneous devices to each other, collecting and processing large volumes of data for decision making without human intervention. However, the information security concern it brings has attracted quite a lot of attention, and, at this stage, the smart step would be to analyze the security issues of IoT platform and get to the state of readiness before embarking upon this attractive technology. The purpose of this paper is to address these issues.

Design/methodology/approach

IoT risk assessment through the application of the analytical hierarchy process (AHP), a favorite multi-criteria decision making technique, is proposed. The IoT risks are prioritized and ranked at different layers, before which a well-defined IoT risk taxonomy is defined comprising of 25 risks across six layers of the IoT model for developing control and mitigation plans for information security of IoT.

Findings

People and processes layer, network layer and applications layer are the top three critical layers with risks like the lack of awareness, malware injection, malicious code injection, denial of service and inefficient policies for IoT practice get the highest priority and rank. Pareto analysis of the overall risk factors revealed that the top ten factors contribute to 80 percent of the risks perceived by information security experts.

Research limitations/implications

The study focuses only on certain predefined constructs or layers of the IoT model traced from legacy studies. It is essential to re-look these constructs on a timely basis to prolong the results’ validity. The study’s empirical scope is confined only to the risk perception of select IoT experts and does not encompass a broader segment of the IoT ecosystem. Therefore, the risks assessment may not be sweeping to a bigger audience.

Practical implications

The study implications are two-fold: one it consolidates the earlier siloed works to intensify the need for risk assessment in the IoT domain, and second the study brings yet another contextual avenue of extending the application AHP and Pareto principle combination. The paper also draws specific critical organizational interventions about IoT risks. A comprehensive approach to prioritizing and ranking IoT risks are present in this research paper.

Originality/value

The contribution of this study to the benchmarking of IoT risk assessment is two-fold. One, a comprehensive risk assessment taxonomy is proposed, and two, the risks are prioritized and ranked to give a convincing reference for the organizations while making information security plans for IoT technology.

Details

Benchmarking: An International Journal, vol. 26 no. 8
Type: Research Article
ISSN: 1463-5771

Keywords

Access Restricted. View access options
Book part
Publication date: 17 May 2018

Caitlin McClurg and Rhiannon Jones

Purpose – The purpose of this chapter is to provide an introductory exploration of how the modern Master of Library and Information Science (MLIS) may contribute to the effect of…

Abstract

Purpose – The purpose of this chapter is to provide an introductory exploration of how the modern Master of Library and Information Science (MLIS) may contribute to the effect of imposter phenomenon (IP) in graduate students and early career librarians and to offer solutions to mitigate the effect.

Design/Methodology/Approach – Six university American Library Association-accredited library master’s programs in North America were identified and compared based on publicly available information on program websites. The authors pose questions about the modern MLIS and identify potential solutions to the issues raised about IP in graduate school and the workplace. Ideas in the chapter are supported by best practices suggested by academic literature on organizational behavior and Library and Information Studies (LIS) scholarship as well as invaluable personal reflections found on blogs and other gray literature sources.

Findings – The modern MLIS produces graduates who can vary greatly in their knowledge of LIS topics and career preparedness. MLIS programs and employers can mitigate the effects of nervousness, burn out, and isolation for high-achieving individuals through career preparedness and continuing education courses and opportunities for positive onboarding and mentorship.

Originality/Value – To date, there is a gap in the LIS literature about IP, especially the connection between the modern MLIS and IP. This chapter provides an exploratory look and asks questions to further the conversation on this topic.

Details

Re-envisioning the MLS: Perspectives on the Future of Library and Information Science Education
Type: Book
ISBN: 978-1-78754-880-0

Keywords

Access Restricted. View access options
Article
Publication date: 2 October 2017

Jamaica Gayatin Ona and Leticia Susan Lagmay Solis

The Ibaloy is an indigenous ethnic group in the Northern Philippines. Due to modernization, changes in lifestyle, livelihood and spiritual inclination many have forgotten about…

1105

Abstract

Purpose

The Ibaloy is an indigenous ethnic group in the Northern Philippines. Due to modernization, changes in lifestyle, livelihood and spiritual inclination many have forgotten about their culture. Income-generating activities such as handicraft businesses and food security are among their needs and aspirations. With the potential that indigenous entrepreneurship has in improving their cultural and economic status, this study aims to identify which crafts in their material culture can be publicly shared as tourism products and to assess the landscape within which indigenous entrepreneurship can be undertaken.

Design/methodology/approach

The study utilized a qualitative methodology which involved a combination of participant observation and semi-structured interviews. An interview guide which consisted of open-ended questions that focused on themes such as identification of Ibaloy crafts, the crafts’ various categorization and significance, the challenges and opportunities and their perceptions on what they want done for their crafts and material culture in general was developed for this purpose. The primary respondents were the Ibaloys themselves and other key informants from government and other stakeholders.

Findings

Other than serving their purpose in an Ibaloy household and as objects used for special occasions, Ibaloy crafts have the potential to be developed as tourism products. While many challenges abound, availability of resources and collaborative support by the government and other institutions can bring opportunities that will lead Ibaloy crafts to become prime tourism products.

Social implications

The findings point to a compelling need for policymakers and concerned authorities to take immediate action to ensure the culture and heritage of the Ibaloys are protected.

Originality/value

The study adds to the literature about Filipino indigenous peoples, particularly the Ibaloys of Cordillera, and their aspirations for the inclusion of their material culture to the tourism industry. It can serve as a guide in addressing issues and concerns related to indigenous entrepreneurship that may be addressed through policy intervention and support from stakeholders.

Details

International Journal of Culture, Tourism and Hospitality Research, vol. 11 no. 4
Type: Research Article
ISSN: 1750-6182

Keywords

Access Restricted. View access options
Book part
Publication date: 12 January 2021

Daniel R. Clark and Jeffrey G. Covin

The literature on international entrepreneurship offers two competing views on why new ventures internationalize: (a) the nature of the opportunity pulls them international or (b…

Abstract

The literature on international entrepreneurship offers two competing views on why new ventures internationalize: (a) the nature of the opportunity pulls them international or (b) the founder pushes the firm international. While these two internationalization drivers are not independent, they do represent unique causal mechanisms. Previously, the tools available to understand the entrepreneur’s disposition toward internationalization were limited. The present study uses the theoretical foundation of the international entrepreneurial orientation construct and from it develops and tests an attitudinally-based individual-level measure of disposition toward internationalization. To ensure the validity and reliability of the new measure, termed International Entrepreneurial Orientation Disposition, studies were conducted to: develop new scale items, examine their psychometric properties and construct validity, and demonstrate criterion validity. A strong measurement model is developed using structural equation modeling (CFI = 0.93, RMSEA = 0.07), and the measure is shown to be useful as a predictor of perceived international venture attractiveness.

Details

Entrepreneurial Orientation: Epistemological, Theoretical, and Empirical Perspectives
Type: Book
ISBN: 978-1-83867-572-1

Keywords

Access Restricted. View access options
Article
Publication date: 1 March 1996

Ian M. Marshall Graham Logan, Richard Callison and Malcolm Dobson

Reviews the growth of TayNet, a local service provider which was established to support the development of businesses in Tayside by providing local access to the Internet…

490

Abstract

Reviews the growth of TayNet, a local service provider which was established to support the development of businesses in Tayside by providing local access to the Internet. Describes the computer, communication and software components of the TayNet Point of Presence along with the technical and end‐user evaluation of the pilot phase. Provides sample performance figures along with connection statistics for 45 active participants during an audit week. Describes technical problems experienced and end‐user requested features and end‐user perceptions and opinions of TayNet and the Internet.

Details

Internet Research, vol. 6 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Access Restricted. View access options
Article
Publication date: 1 March 1984

Roberta Lumek

This work was originally commissioned during 1982, the year that was designated Information Technology Year; the year that the personal computer replaced the space invader machine…

624

Abstract

This work was originally commissioned during 1982, the year that was designated Information Technology Year; the year that the personal computer replaced the space invader machine as a focus for teenage obsession; the year of the library symbol, the Hunt Report on cable TV; the year the US Post Office issued two stamps celebrating American libraries, and the British Post Office issued a stamp for IT year suggesting that libraries were a thing of the past. The work was intended to look at “the background to the IT revolution, the benefits of applying technology to library services and the reasons for its relatively slow progress”. It was envisaged at the time that what would have been effectively a state‐of‐the‐art report on the technology available to libraries, and who was doing what with it, would be a useful tool for library managers introducing or extending library technical services. It might usefully have complemented the LA publication, The impact of new technology on libraries and information centres (LA, 1982). However, for a variety of reasons it was not possible to produce the publication in 1983 as intended; the person commissioned to write it was unable to do so; and eventually, in 1984, it was realised that the speed of development and availability of technology was such that any such work would be useless as a practical guide within months of publication. The growth, during the period, of journals on the subject of library applications of IT of all kinds; the appearance of regular updates in the generalist professional press; the formation of, for example, the Library Association IT Group: all these developments clearly offered better opportunities of current awareness to the library manager than could be achieved by a single monograph.

Details

Library Management, vol. 5 no. 3
Type: Research Article
ISSN: 0143-5124

Access Restricted. View access options
Article
Publication date: 11 September 2017

Jon Randall Lindsay

The empirical record of cyberattacks features much computer crime, espionage and hacktivism, but none of the major damage feared in prevalent threat narratives. The purpose of…

1854

Abstract

Purpose

The empirical record of cyberattacks features much computer crime, espionage and hacktivism, but none of the major damage feared in prevalent threat narratives. The purpose of this article is to explain the absence of serious adverse consequences to date and the durability of this trend.

Design/methodology/approach

This paper combines concepts from international relations theory and new institutional economics to understand cyberspace as a complex global institution with contracts embodied in both software code and human practice. Constitutive inefficiencies (market and regulatory failure) and incomplete contracts (generative features and unintended flaws) create the vulnerabilities that hackers exploit. Cyber conflict is a form of cheating within the rules, rather than an anarchic struggle, more like an intelligence-counterintelligence contest than traditional war.

Findings

Cyber conflict is restrained by the collective sociotechnical constitution of cyberspace, where actors must cooperate to compete. Maintenance of common protocols and open access is a condition for the possibility of attack, and successful deceptive exploitation of these connections becomes more difficult in politically sensitive situations as defense and deterrence become more feasible. The distribution of cyber conflict is, thus, bounded vertically in severity but unbounded horizontally in the potential for creative exploitation.

Originality/value

Cyber conflict can be understood with familiar political economic concepts applied in fresh ways. This application provides counterintuitive insights at odds with prevalent threat narratives about the likelihood and magnitude of cyber conflict. It also highlights the important advantages of strong states over the weaker non-state actors widely thought to be empowered by cyberspace.

Details

Digital Policy, Regulation and Governance, vol. 19 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

Access Restricted. View access options
Article
Publication date: 7 February 2025

Nadia A. Abdelmegeed Abdelwahed, Safia Bano, Mohammed A. Al Doghan and Bahadur Ali Soomro

Currently, innovation performance (IP) and innovation quality (IQ) are essential intertwined constructs that help small- and medium-sized enterprises (SMEs) thrive in a…

16

Abstract

Purpose

Currently, innovation performance (IP) and innovation quality (IQ) are essential intertwined constructs that help small- and medium-sized enterprises (SMEs) thrive in a competitive business environment and achieve long-term success and sustainability. This paper aims to examine the effect of top management knowledge values (TMKVs), knowledge-oriented culture (KOC) and rewards on IP and IQ through knowledge sharing.

Design/methodology/approach

The authors used a deductive cross-sectional data approach and a standardized questionnaire adopted from the literature to obtain responses from the employees of Egyptian manufacturing SMEs. The authors based this study’s findings on 316 usable samples by applying the purposive sampling technique.

Findings

Using structural equation modeling (SEM) with path analysis using SmartPLS4, the findings of this study demonstrate that TMKV positively affects IP but not IQ. On the one hand, the KOC and knowledge-sharing process (KSP) are positive enablers of IP and IQ. On the other hand, knowledge-based reward (KBR) has an insignificant effect on IP and IQ. Moreover, while KSP mediates TMKV’s and KOC’s connections with IP and IQ, it does not mediate KBR’s relationship with IP and IQ.

Practical implications

This study’s findings will help policymakers and planners create strategies through knowledge management to improve employees’ vision, commitment and dedication, culminating in a favourable impact on IP and IQ. These findings highlight the need to foster a knowledge-based culture that promotes communication networks, establishes trust and enables individuals to make decisions to enhance organizational success, IP and IQ.

Originality/value

In the case of a developing country, this study helps to fill the gaps by offering an integrated framework that simultaneously explores knowledge management enablers, IP and IQ.

Details

International Journal of Innovation Science, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1757-2223

Keywords

Access Restricted. View access options
Book part
Publication date: 15 January 2010

Isobel Claire Gormley and Thomas Brendan Murphy

Ranked preference data arise when a set of judges rank, in order of their preference, a set of objects. Such data arise in preferential voting systems and market research surveys…

Abstract

Ranked preference data arise when a set of judges rank, in order of their preference, a set of objects. Such data arise in preferential voting systems and market research surveys. Covariate data associated with the judges are also often recorded. Such covariate data should be used in conjunction with preference data when drawing inferences about judges.

To cluster a population of judges, the population is modeled as a collection of homogeneous groups. The Plackett-Luce model for ranked data is employed to model a judge's ranked preferences within a group. A mixture of Plackett- Luce models is employed to model the population of judges, where each component in the mixture represents a group of judges.

Mixture of experts models provide a framework in which covariates are included in mixture models. Covariates are included through the mixing proportions and the component density parameters. A mixture of experts model for ranked preference data is developed by combining a mixture of experts model and a mixture of Plackett-Luce models. Particular attention is given to the manner in which covariates enter the model. The mixing proportions and group specific parameters are potentially dependent on covariates. Model selection procedures are employed to choose optimal models.

Model parameters are estimated via the ‘EMM algorithm’, a hybrid of the expectation–maximization and the minorization–maximization algorithms. Examples are provided through a menu survey and through Irish election data. Results indicate mixture modeling using covariates is insightful when examining a population of judges who express preferences.

Details

Choice Modelling: The State-of-the-art and The State-of-practice
Type: Book
ISBN: 978-1-84950-773-8

1 – 10 of 131
Per page
102050